Technical & Security Architecture Overview
Watch a short walkthrough of how Memory Avatar protects sensitive recordings.
The Memory Avatar platform was designed as a secure, encrypted digital space for creating and delivering sensitive thoughts, memories, and personal audio messages.
The system is architected to:
Security is not a feature — it is foundational architecture.
All personally identifiable information (PII) is encrypted at rest, including:
All client-server communication is secured via SSL/TLS encryption, protecting against man-in-the-middle attacks, data interception, and session manipulation.
Encryption keys are managed through AWS Key Management Service (KMS). Keys are not stored at the application layer and are governed by strict access policies.
All audio files are encrypted using unique, individual encryption keys.
The system follows a Zero-Access architecture principle.
Each audio file requires two independent codes:
Only when both codes are entered correctly is a temporary decryption key generated. If one code is incorrect, the file remains locked permanently.
If either the email or phone number is incorrect, the system prevents unintended access. This significantly reduces accidental delivery risk.
Content is never permanently exposed in uncontrolled environments.
If a user does not log in for 180 days:
If confirmed inactive, all designated recordings are released to recipients, regardless of subscription status.
Digital legacy activation is a core system function.
Privacy is enforced through architecture — not merely through legal terms.
Memory Avatar is built as:
Technology does not monitor. It protects.